This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
-
Updated
Apr 29, 2023 - C
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via SystemFucntion033 NtApi and No new thread via Fiber
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Various methods of executing shellcode
PoC for downloading data by injecting into processes to evade firewalls
Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster
PoC shellcode injector using clean syscalls to bypass user-mode hooks in ntdll.dll
Modular C2 loader featuring dynamic function encryption, in-memory payload support, and a covert DoH command channel, configurable via a Python builder and a Node.js web panel.
PoC implementation of the GhostWriting injection technique for x64 Windows
PoC Linux process injection to hide execution of "benign" binary.
Trojan that uses direct System Calls to inject shellcode into a target process, undetected by Windows Defender & Bitdefender
Dll Shellcode Loader POC
A novel process injection technique using tagCLS based on atombombing
Malware development using C programming language and Windows32 API's
PG ITSi: ProcessInjection
A concise cheatsheet covering key process code injection techniques for red teaming and malware development.
Source code examples for a deprecated "DLL Memory Mapped Path Inclusion framework."
Simple malware samples developed using C and Win32API utilising process injection techniques like shellcode injection and dll injection which involve injecting malicious shellcode into benign processes
A simple implementation of process code injection. This demonstrates injecting shellcode into a remote process, using basic Windows API functions for process manipulation.
Add a description, image, and links to the process-injection topic page so that developers can more easily learn about it.
To associate your repository with the process-injection topic, visit your repo's landing page and select "manage topics."